Professional Documents
Culture Documents
Introduction To Centrify
Introduction To Centrify
$86B
SPENT ON SECURITY
66%
YET 66% OF COMPANIES
IN 2017 ARE STILL BREACHED
81% 80%
breaches involve weak, breaches involve
default or stolen passwords privileged credential misuse
Private vs. Public vs. Hybrid Cloud, Logicworks, March 2015; The Explosion of Apps: 27% are Risky, CloudLock, December 2016
© 2018 Centrify Corporations. All Rights Reserved.
Mobile Visual Networking Index (VNI) Forecast, Cisco, February 2017; 50 Billion Things Will Be Connected to the Internet by 2020, Cisco, 2013
4
Verizon 2017 Data Breach Investigations Report, Forrester Wave™: Privileged Identity Management, Q3 2016
THIS NEW THREATSCAPE REQUIRES
ZERO TRUST SECURITY
1 what we know
about you
2 what we know
about your device
3
All access to services
must be authorized
SECURES ACCESS
SECURES ACCESS TO APPS TO INFRASTRUCTURE
Data Center Servers Big Data
Network Devices
Geo-velocity Time of
RISK SCORE Day
59
Day of
Device
Week
Geo-velocity Time of
RISK SCORE Day
59
Day of
Device
Week
MACHINE LEARNING
VERIFY THE USER VALIDATE THEIR DEVICE LIMIT ACCESS & PRIVILEGE
© 2018 Centrify Corporations. All Rights Reserved. 13
OUR UNIFIED PLATFORM FOR ZERO TRUST
ANALYTICS
Risk-based User Scoring › Behavior Analysis and Reporting
CORE SERVICES
Directory + Policy + Federation + Workflow + Reporting
AUDIT
EVERYTHING
ENFORCE
LEAST PRIVILEGE
LIMIT
LATERAL MOVEMENT
ESTABLISH
IDENTITY ASSURANCE
DANGER
Too Many Passwords
Too Much Privilege
MATURIT
Consolidate Identities Establish Access Zones Just-in-Time Privilege Analyze Risk Y
MFA Everywhere Trusted Endpoints Just Enough Privilege Monitor Sessions
Risk-based Access Conditional Access Don’t Break Glass Integrate with SIEM
SSO Everywhere Minimize VPN Access Lifecycle Management
No DevOps Passwords
© 2018 Centrify Corporations. All Rights Reserved. 15
FORRESTER FINDS IMPLEMENTING
BEST PRACTICES RESULTS IN
Big Data
Network Devices
LEADER GARTNER IDAAS MQ PC MAGAZINE EDITOR’S CHOICE NETWORK WORLD CLEAR CHOICE WINNER
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester’s call on a Gartner “Magic Quadrant for Identity and Access Management as a Service” by Gregg Kreizman, June 2016. Gartner does not endorse
market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors
vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect the with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization
© 2018 Centrify Corporations. All Rights Reserved. judgement at the time and are subject to change.
19
and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
5,000+
Trusted by over 5,000 customers
95%
Retention
© 2018 Centrify Corporations. All Rights Reserved. 20
6 of top10 7 of top10 100+
U.S. Financial Services Pharma Companies Federal Agencies
Companies